1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anit [1.1K]
3 years ago
8

As you are working on the Datacenter Edition server, you install a card to connect a set of RAID drives. After the card and driv

es are set up, you run the installation disc that accompanies the RAID drives and card. When you reboot the server, you get a message about problems with two .dll files. What has most likely happened and how can you fix it
Computers and Technology
1 answer:
sweet [91]3 years ago
4 0

Answer:

by fixing it with card

Explanation:

you have taken out the card I thing

You might be interested in
b. Suppose instead that Miller had written a routine to constantly change his assigned IP address to other addresses used by his
amm1812

Answer:

It wouldn't be legal practice of SLS’

Explanation:

The Internet service address is the address of the internet where we getting the address of the internet sometimes it is known as the computer address of the host machine.  

Since the miller has changed the Ip address continuously in a constant manner also the other address which is giving by the internet service provider  The transfer of IP address, Miller will be able to receive their network. That sort of practice is not legal of SLS.

5 0
4 years ago
A method for selecting multiple lines of text is to _______. select one:
Aliun [14]
I would probably say B even though the other methods might work as well
5 0
3 years ago
The concept of a process in an operating system embodies two primary characteristics, one of which is:
miv72 [106K]

Answer:

Resource Ownership and Scheduling execution

Explanation:

In process characteristic the characteristic is

  • Resource ownership
  • Scheduling / Execution

In Resource ownership, the OS performs a protection function where unwanted interference in processes are with resources

In scheduling execution, the process has execution state and scheduled. They can be separated by resource ownership.

The dispatching of the process is the lightweight process, and it is multi-threading. The ability of the operating system supports the single concurrent process.

The process is a unit in the resource protection and protected the CPU and other processes. It contains the multiple thread execution

Each thread contains the running, ready state and saved the thread context and access the memory. Some necessary activities of the various threads are the same address space and the resources.

7 0
4 years ago
"The number of hardware chips needed for multiple digit display can be minimized by using the technique called ________"
Dafna1 [17]

Answer: Multiplexing

Explanation:

By using the multiplexing technique we can easily use the multiple digit display in the input pins of the hardware. We can use this technique to display the several digits and the extra hardware is require which is proportional to the number of several digit to be display.

As, hardware use only limited number of input and output pins. Therefore, multiplexing is the technique used the number of hardware chips need for multiple digit display and can be minimize using this technique.

 

4 0
3 years ago
If the numbers on the spring scales read 200 g. What property of the shoes is being measured?
lianna [129]
Pretty sure its mass
5 0
3 years ago
Other questions:
  • There are several vehicles in a parking lot. Some of them are motorcycles
    8·2 answers
  • Which of the following techniques would a Baroque composer most likely employ to evoke an affect of agitation? Select one:
    14·1 answer
  • SATCOM in the Ku- and Ka- bands, as well as EHF systems are adversely affected by rain (the higher the frequency, the greater th
    14·1 answer
  • Can you guys help me plz <br> I want c++ code
    12·1 answer
  • What is the purpose of the literature review section of research paper
    14·1 answer
  • Which of the following statements is NOT true about url extension?
    10·2 answers
  • What are the pros and cons of using ICT​
    13·1 answer
  • How i simplify this boolean expression ?A'.B'.C'+A'.B'.C+A'.B.C+A.B'.C+A.B.C
    6·2 answers
  • Firewalls are available as a special hardware device or as software. A firewall will block packets of information that are from
    7·1 answer
  • What is the function of a primary key in a table? to uniquely identify each record in the table to uniquely identify foreign key
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!